| Version | Supported |
|---|---|
| Latest | ✅ |
We take security vulnerabilities seriously. If you discover a security issue, please follow these steps:
- DO NOT create a public GitHub issue
- Email security details to the maintainers
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
When using DBML:
-
Schema Validation: Always validate generated DBML before use in production environments.
-
Input Sanitization: If generating DBML from user input, sanitize strings properly to prevent injection attacks.
-
Generated SQL: If using DBML to generate SQL schemas, review the output for any security implications before executing in production databases.
DBML is designed with security in mind:
- Zero external dependencies (reduces supply chain risks)
- No network operations
- No file system operations beyond normal Go imports
- Pure Go implementation
- Thread-safe operations
We appreciate responsible disclosure of security vulnerabilities.